TY - JOUR
T1 - A review of attribute disclosure control
AU - Matwin, Stan
AU - Nin, J.
AU - Sehatkar, Morvarid
AU - Szapiro, Tomasz
N1 - Funding Information:
This work is partially supported by the Ministry of Science and Technology of Spain under contract TIN2012-34557 and by the BSC-CNS Severo Ochoa program (SEV-2011-00067). The authors also acknowledge the support of the Natural Sciences and Engineering Research Council of Canada for this work.
Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - Attribute disclosure occurs when the adversary can infer some sensitive information about an individual without identifying individual’s record in the published data set. To address this issue several privacy models were proposed with the goal of increasing the uncertainty of the adversary in deriving sensitive information from published data. In this chapter, firstly we review the underlying scenario used in statistical disclosure control (SDC) and Privacy-Preserving Data Mining (PPDM). In this chapter, we describe the attribute disclosure underlying scenario, the different forms of background knowledge of the adversary the adversary may have and their potential privacy attacks. then, we review the approaches introduced in the literature to tackle attribute disclosure attacks.
AB - Attribute disclosure occurs when the adversary can infer some sensitive information about an individual without identifying individual’s record in the published data set. To address this issue several privacy models were proposed with the goal of increasing the uncertainty of the adversary in deriving sensitive information from published data. In this chapter, firstly we review the underlying scenario used in statistical disclosure control (SDC) and Privacy-Preserving Data Mining (PPDM). In this chapter, we describe the attribute disclosure underlying scenario, the different forms of background knowledge of the adversary the adversary may have and their potential privacy attacks. then, we review the approaches introduced in the literature to tackle attribute disclosure attacks.
UR - http://www.scopus.com/inward/record.url?scp=84927143005&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-09885-2_4
DO - 10.1007/978-3-319-09885-2_4
M3 - Review
AN - SCOPUS:84927143005
SN - 1860-949X
VL - 567
SP - 41
EP - 61
JO - Studies in Computational Intelligence
JF - Studies in Computational Intelligence
ER -